General
-
Target
OperaGXSetup.exe
-
Size
3.4MB
-
Sample
230327-qr5qhsdf49
-
MD5
3e9d80732d89a11d90c9ec415e5a3ee7
-
SHA1
91779a40f67ab706490afc2cbf419c1ccfc7c457
-
SHA256
7800a0df6369f0f87a5578267a686b0160d5e91597e6ccc1458f4fe3aaf46c5d
-
SHA512
3e2ed97f02cd57d884281d1db25b519b6d27d09eab920f77b14c8851f5ace6d40e9b590e4e744a2ed402e7960061060e097e728141d6db6b49a9a0674bac532b
-
SSDEEP
98304:Bj+NFUv05HPud71aTd6JF8l4hTJlqdM/NnOHdHlM3MSq6LE1azr3l0tXcNKq+Sz:Bu9R47cB6JF82NJlRolXSqZpt5Oz
Behavioral task
behavioral1
Sample
OperaGXSetup.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral2
Sample
out.exe
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
OperaGXSetup.exe
-
Size
3.4MB
-
MD5
3e9d80732d89a11d90c9ec415e5a3ee7
-
SHA1
91779a40f67ab706490afc2cbf419c1ccfc7c457
-
SHA256
7800a0df6369f0f87a5578267a686b0160d5e91597e6ccc1458f4fe3aaf46c5d
-
SHA512
3e2ed97f02cd57d884281d1db25b519b6d27d09eab920f77b14c8851f5ace6d40e9b590e4e744a2ed402e7960061060e097e728141d6db6b49a9a0674bac532b
-
SSDEEP
98304:Bj+NFUv05HPud71aTd6JF8l4hTJlqdM/NnOHdHlM3MSq6LE1azr3l0tXcNKq+Sz:Bu9R47cB6JF82NJlRolXSqZpt5Oz
Score8/10-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
out.upx
-
Size
5.8MB
-
MD5
24ecd18f6ab6135a035e25b11ce5d5d0
-
SHA1
45060ea19d6429142c094ea30dd6e9a9ff7e68fa
-
SHA256
6aed99471de63bb29898e233a85c33705fe29b6af9df0f4c7ce107fabcb0ea41
-
SHA512
1704d1082aff56a0d68f51edb1bd488c9dd573454ad013c881263cdcb8fc518f25816c3fcacb2b6bd11bcaea25d93beb2f39bbb2690bb6ae1df24a3f5ce221e6
-
SSDEEP
98304:Lvp6666666666666666666666666666666x666666666666666fwwwwwwwwwwwwY:iYKAzWNYalfReEQaEvD16fqJnppCOWKC
Score1/10 -